|Email:||jdelorimier (at) hotmail (dot) com [email concealed]|
|Location:||Flagtown, New Jersey, United States|
|Position/Title:||Manager, Information Security|
Jacques A. DeLorimier, CISSP, EnCE
211 Copperfield Lane • Metuchen, NJ 08840 • (862) 485-1412 • jdelorimier (at) hotmail (dot) com [email concealed]
• Ability to balance and integrate competing and/or conflicting agendas intelligently and
with minimum disruption. Experience and ease in interfacing with Senior Management.
• Highly regarded by clients for focused, clear communication skills and the ability to
effectively collaborate, assess needs, and deliver creative, appropriate solutions.
TD Ameritrade, Jersey City, NJ 4/2006 to Present
Senior Forensic and Incident Response Engineer: Investigated instances of corporate malfeasance and providing litigation support in such matters as theft of intellectual property, illegal diversion of internal assets, cyber-hacking and corporate compliance. Provided case support for electronic discovery and computer investigation assignments for HR/Legal/Compliance/Chief Security Officer (CSO). Conducted analysis of media using various forensic tools including FTK, Encase, Discovery Attender and Paraben. Proficient in the extraction of data from internet files, enterprise/user-based operating logs, and e-mail systems. Provided evidence collection plans; evaluated storage devices including computer hard disks, servers and portable devices,
and coordinated field collection of data. Responsible for all aspects of documentation (chain
of custody, analysis and reporting). Developed processes for baselining Servers and Desktops. Utilized several Enterprise Network/Audit Security Apps for Incident Response cases including; Zantaz, Mazu, Arbor Peakflow, Verdasys, D3 (Case Management) and Loglogic.
• Experienced with data loss prevention (DLP) technology and content management.
• Knowledge of open-source vulnerability assessment and penetration testing tools.
Worked with vendors to implement penetration testing and vulnerability assessments.
Knowledgeable in hacking and password cracking techniques.
• Excellent understanding of security requirements, specifications and compliance issues.
• Assisted in the development of standards and procedures for the performance of security monitoring, Computer Incident Response Team (CIRT), incident management, and
vulnerability assessment. Supported the development and on-going production of security operations related for reporting to management.
• Investigated phishing complaints and initiated takedowns of phishing sites. Reviewed stolen collected credentials and worked with Fraud department to protect unwitting clients.
• Made recommendations for network and security device (IDS/IPS/Firewall) configuration changes based upon incident analysis, risk assessment, and vulnerability assessment.
• Provided guidance to project teams on incorporating security services into their design and assessing the implementation is accurately completed.
• Responsible for case management. Initiatives resulted in reduced lead-time for the submission
of evidence used in legal action and the ability to curtail unnecessary investigations.
Bristol-Myers Squibb (BMS), Hopewell, NJ 8/2004 – 1/2005, 4/2005 to 4/2006
Consultant: As part of a Sarbanes-Oxley Initiative (SOX), improved and expanded BMS’s Computer Forensics/Incident Response lab and processes. Developed enterprise-wide Computer Forensics capabilities and designed/implemented a new Computer Forensics Lab. Investigated and responded to security incidents throughout the globe. Developed SOPs/processes based on industry best practices using best-in-class tools. Constructed the infrastructure, with segmented repository, to support secure, scalable identification, preview, acquisition and analysis of remote digital media over the local and wide area network using Encase Enterprise Edition. Worked with HR/Legal departments to resolve internal wrong doing. Acted as resource for Information Security Team in other security projects including Electronic Legal Discovery Services, Spyware and IDS initiatives.
FTI Consulting, NY, NY 1/2005 – 4/2005
Senior Consultant: Provided Computer Forensics and Electronic Discovery Services to national law firms and Fortune 500 corporations. Managed day-to-day aspects of client relationships and projects. Worked in the identification and up-front evidence collection process in the field and within corporate forensics lab. Worked with audit committees and attorneys to resolve internal wrongdoing. Cases included money laundering, securities violations, bankruptcy projects, corporate compliance and fraud.
Rachlin Cohen and Holtz, LLP, Miami, FL 1/2003 – 1/2004
Computer Forensics Examiner: Performed Computer Forensic acquisitions, data recovery and analysis in support of numerous civil and criminal cases. Performed over 200 PC acquisitions and analyses using Encase and Forensic Tool Kit (FTK). Researched Computer Forensics Lab processes and procedures based on industry best practices. Implemented lab creation and design. Created, managed and programmed database systems in support of Forensic Accounting and Litigation projects. Investigated/Incident Response to security incidents/cyber hacking. Performed security audits of networks and PCs. Project managed migration of large Datacenter from Miami to Mexico. Executed database design and data mining in support of a $400 million criminal and civil investigation. Taught certification program for Florida Atlantic University.
Various Companies, Manhattan, NY and Florida 1/1996 – 1/2003
Consulting for various corporations including Morgan Stanley, Arthur Anderson, Mitchell Madison, Drake Beam Morin, Goldman Sachs and MVBMS EURO RSCG.
Electronic Crimes Task Force Member
Assisted in investigation/lockdown of $400 million Investment Co: Using seized assets, a fully functioning receivership was established at a nearby location. Company’s faulty databases were recreated, redesigning certain necessary components and verifying data against written scanned copies of original documents. During the investigation process deleted emails and documents by the company’s officers were recovered. Largely as a result of the work in cooperation with the Florida Dept. of Financial Services the investment company’s CEO and executives were indicted.
Assisted in investigation in theft of trade secrets: As a result of a lawsuit and the evidence presented, the court ordered an investigation of our clients competitors’ computers. A program (developed for the sales force which included margins, cost lists, salaries and other proprietary information) was believed to have been stolen by a disgruntled employee hired away by the competitor. During the investigation several PCs were acquired. A deleted copy of the software was found on a computer belonging to the President/CEO of the competitor company.
B.S. in Electrical Engineering, Minor in Business Management. Stony Brook University, NY
• Cert. Info. Systems Security Pro. (CISSP) • SANS Training (IR/Forensics) • MCSA (2K)
• Encase Certified Engineer (EnCE) • Fraud/Ethics Training (ACFE) • Security+ Certified
• Computer Forensics Certified (FTK) • Risk Assessments • A+/Network+ Certified
Electronic Crimes Task Force/CSL (program implemented by the FBI and Secret Service), training in Forensics, Security Reviews, SOX, Legal issues, Steganography, Alternate Data Streams (ADS), and Wireless Security. Additional training from the Association of Certified Fraud Examiners Association on auditing for internal compliance, investigating by computer, check fraud, and general fraud principles.
Encase Network Intrusions Investigations: Class covered the several topics including; Use of virtualized environments in investigations, Collection of volatile data from live system, Hiding and manipulating data, Trojans and Malware, Combating the Trojan virus defense, Footprinting and vulnerability scanning, Web Server attacks, Analyzing network traffic (sniffing), Netbios/FileSharing attacks and Windows rootkits
SANS Training: System Forensics, Investigation, and Response teach forensic techniques and tools in a hands-on lab for both Windows and Linux based investigations. Used diverse tools such as the Sleuthkit, Foremost, and the HELIX Forensics Live CD to perform analysis and reporting on both incident identification and post-compromised systems.